SUCHE
-
M2M Asia 2012
“Services, Applications and Technologies”, M2M Asia 2012 will stir discussions to cover a broad range of topics relating to the business opportunities for M2M & IOT as well as the impact of M2M in [...] environments. The objective of M2M Asia 2012 is to examine the current state of the overall market, as well as the impact recent developments are likely to have on the future evolution of the market. Termin:
-
CiViQ brings quantum technologies to the telecommunications arena
was based on electric power to drive mass production, the third used electronics and computing to automate this production, and finally the fourth used digital technologies to radically change the way we [...] Variable Quantum Communications) will search for a means to overcome these obstacles. Selected as one of the 20 projects to give commencement to the Quantum Flagship, an ambitious 1b€ initiative supported [...] ultimate goal is to offer accessible, innovative services to individuals, industries and institutions that can meet the needs of a market where secure communications is a hot topic to be solved nowadays
-
AIT Vorträge auf dem International Symposium on Visual Computing (ISVC)
and are indication for further surface degradation right up to rail break. Due to security issues, defects have to be recognized early in order to take countermeasures in time. By means of differently colored [...] hypotheses in the EPI domain, which can directly be related to depth. The considered methods used in hypothesis assessment, which belong to a broader class of block-matching algorithms, are modified sum [...] by a shape-from-focus algorithm. A linear sharpness measure is shown to be computational advantageous as computational refocusing to a specific depth and sharpness assessment of each refocused image can
-
CREDENTIAL kick-off meeting
meeting took place in Vienna, Austria where all partners got together in order to discuss about the implementation of the action and to define next steps and goals. CREDENTIAL is a EU Horizon 2020 funded research [...] level of security than other current solutions. The main idea and ambition of CREDENTIAL is to enable end-to-end security and improved privacy in cloud identity management services for managing secure [...] these services relies on the combination of strong hardware-based multi-factor authentication with end-to-end encryption representing a significant advantage over current password-based authentication schemes
-
Best Paper Award at "ICQNM 2014 - The Eighth International Conference on Quantum, Nano/Bio, and Micro Technologies"
Nano/Bio, and Micro Technologies", which took place from 16th to 20th of November in Lisboa, Portugal. Our experts also were invited to publish an extended version of the paper in the "International [...] result, we show that the adversary’s information can be reduced to an amount of I_AE~ 0.20752 when using a single basis transformation and to an amount of I_AE~ 0.0548 when combining two different basis [...] tions as a security measure for quantum key distribution protocols based on entanglement swapping. To estimate the security, we focus on the information an adversary obtains on the raw key bits from a
-
AIT lecture at MedicineX in Stanford
at least once a year. In order to develop an individualized fall prevention strategy for older people living in the community, the first step is to assess their fall risk to determine the starting points [...] advance the practice of medicine, improve health, and empower patients to be active participants in their own care. The “X” is meant to encourage thinking beyond numbers and trends—it represents the infinite [...] work focuses on the feasibility of a self-assessment fall prediction, prevention and feedback approach to empower older people living at home.About Stanford Medicine X Medicine X is a catalyst for new ideas
-
MITIGATE
- /themen/cyber-security/projects/mitigate
process chain to protect them from cybercrime activities. The MITIGATE system detects weak points in the IT infrastructure , enables optimal security measures to be developed, uses social media to uncover new [...] cyber security resources and supply chain processes. The overall concept is to build up a collaborative risk assessment system to provide insights into risk assessment and risk mitigation. ICT systems in [...] of the MTITGATE methodology suits the purposes to assess the cyber risks for all business partners involved in a maritime supply chain service (SCS) and to build the basis for the creation of the MITIGATE
-
PRISMACLOUD - PRIvacy and Security MAintaining services in the CLOUD
methods to practical application to improve the security and privacy of cloud based services and make them usable for providers and users. The main idea and ambition of PRISMACLOUD is to enable end-to-end [...] security for cloud users and to provide tools to protect user privacy with the best technical means possible - by cryptography. To make this vision come true, PRISMACLOUD plans innovation in the fields [...] their own data, but hand them over to external untrusted parties, i.e. cloud service providers, for processing and storage. Currently there exist no satisfactory approaches to protect data during its lifetime
-
CEO Knoll signed agreement for an AIT Joint Laboratory in Singapore
environment – contributes greatly to an integrated approach towards sustainable buildings. To be energy-efficient and sustainable, building envelopes should be active on all levels to utilize microclimatic energy [...] are closely related to high performance building envelopes and façade systems. With innovative combinations of design, technology and materials, a responsive building envelope – tuned to interact with the [...] Laboratory in Singapore for the emerging topic green building envelopes.February, 18th, 2013, as a prelude to the start of the planned cooperation in Singapore, AIT managing director Wolfgang Knoll signed a memorandum
-
Rescue of the Aral Sea
invited to actively participate in Working Session 1. The main purpose of the meeting was to discuss the situation in the Aral Sea Basin and mobilize the efforts of international community to carry out [...] In the early 1960s the Aral Sea used to play a main role in the development of region’s economy, having become ‘the heart’ of fishing industry. Today, the Aral Sea has become a desert area of 5.5 million [...] with a speech from The President of Uzbekistan Islom Karimov pointing out, that statistics is not able to picture the full extent of the humanitarian catastrophe in the Aral Sea region: shortage of water resources
-
Successful End of the b-Part Project
enabled citizens to propose own ideas and voice concerns related to urban planning and urban life by posting geo-referenced contributions. City officials responded and gave feedback to citizens input but [...] Urban Europe programme. The aim was to explore the requirements, opportunities, and impacts of implementing pervasive citizen participation concepts in urban governance. To do so, the highly interdisciplinary [...] but also received relevant insights to current plans themselves. At the end of the Living Lab we counted 780 registered users, 193 posted contributions, 256 comments and 15 missions. The rich data set gathered
-
Kinematic Viscometer
- /themen/thermophysik/methoden/kinematic-viscometer
Viscometer Anton Paar SVM 3001 Temperature range : -60 °C to +135 °C Viscosity range : 0.2 mm²/s to 30 000 mm²/s Density range : 0.6 g/cm³ to 3 g/cm³ Sample volume : min./typical 1.5 mL / 5 mL
-
QSCAN
- /themen/cyber-security/projects/qscan
QSCAN QSCAN Quantum space surveillance tracking To solve the privacy issues related to usage of third - party data and taking advantage of access to telescopes that allow getting observational data , a [...] will replace the need for sharing agreements and allow to securely computing a probability of collision between space objects without disclosing to other party its own inputs. The implementation of the
-
Project kick-off meeting: SECCRIT
The goal of the SECCRIT project is to analyse and evaluate cloud computing technologies with respect to security risks in sensitive environments, and consequently to develop methodologies, technologies [...] project kick-off. The SECCRIT project (SEcure Cloud computing for CRitical infrastructure IT) is a small-to-medium sized collaborative EU-funded research project in the 7th Framework Programme (FP7-SEC-2012-1) [...] infrastructures. At the kick-off meeting, there were lively discussions about the research challenges to be addressed by the project, which resulted in a productive and friendly atmosphere.You can find more
-
THE RTO INNOVATION SUMMIT
delighted to invite you to The RTO Innovation Summit in Brussels on 6 – 7 November 2018! Ten leading European Research and Technology Organisations (RTO) host this first-class event to let you experience [...] experience the united power of European applied research in a lunch-to-lunch event packed with the latest insights and cutting-edge technologies. An inspiring conference programme will show you the world [...] perfect and exquisite surrounding for both, exhibition and conference. We are looking forward to welcoming you for an outstanding experience! Visit our website for further information and registration
-
Invitation to THE RTO INNOVATION SUMMIT
delighted to invite you to The RTO Innovation Summit in Brussels on 6 – 7 November 2018! Ten leading European Research and Technology Organisations (RTO) host this first-class event to let you experience [...] experience the united power of European applied research in a lunch-to-lunch event packed with the latest insights and cutting-edge technologies. An inspiring conference programme will show you the world [...] perfect and exquisite surrounding for both, exhibition and conference. We are looking forward to welcoming you for an outstanding experience! Visit our website for further information and registration
-
Smarticipate project well under way
Hamburg. The Smartathons brought together residents of the cities to get their input on how they would like the smarticipate platform to function in practice. The next Smartathon will take place in Rome [...] Open Governance in the Smart City is available to download from the smarticipate website. It provides an overview of how cities are using smart technology to enhance governance processes. Based on an analysis [...] analysis of 11 case studies, the document outlines seven recommendations, or things to be considered by cities when using ICT in open governance processes. As a core partner within smarticipate, AIT is
-
MEASURE
- /themen/cooperative-digital-technologies/projekte/maia-1
for Reliable Evaluation To overcome emergencies and disasters effectively means that first responders must maintain constant training and exercising. Simulations are performed to generate effective learning [...] learning experiences and useful findings, which later can be utilized to design new tactics, response equipment or training content. To achieve valuable exercise output, the evaluation approach must allow [...] ns are prone to human bias. MEASURE examines the applicability of Artificial Intelligence , as well as multi -dimensional analysis of sensor signals (such as position, movement, etc.), to establish valid
-
STAMINA
- /themen/cooperative-digital-technologies/projekte/stamina
Infectious diseases have the potential to result in serious cross-border public health threats. Management of this type of crisis remains a serious challenge due to number of people involved, the different [...] crisis management infrastructures. THE PROJECT STAMINA helps to overcome these challenges by providing improved decision -making technology to pandemic crisis management practitioners at a regional, national [...] main objectives: Create a set of guidelines and best practices to improve preparedness and response. Provide stakeholders with novel, easy-to-use software tools that complement EU-level systems . Increase
-
AIT-SA-20210215-02-qcubed
- /themen/cyber-security/pentesting/security-advisories/ait-sa-20210215-02
executed. Unfiltered: We were able to write proof-of concept exploit for mysql and postgres. Unfortunately with mysql we were not able to use a stacked-queries-payload and we had to exploit this vulnerability [...] an unauthenticated attacker to access the database by injecting SQL code via a crafted POST request. strQuery parameter of the serialized array in profile.php could lead to a sql-injection: Inside the [...] remotely. In worst case scenarios an attacker might be able to execute code on the remote machine. Mitigation A patch was delivered by QCubed that allows to disable the profile-functionality. Vendor Contact Timeline